Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

backups: always in season, never out of style.


devel / comp.protocols.kerberos / Re: Using PKINIT with ECC

SubjectAuthor
o Re: Using PKINIT with ECCGreg Hudson

1
Re: Using PKINIT with ECC

<mailman.29.1708730585.2322.kerberos@mit.edu>

  copy mid

https://www.novabbs.com/devel/article-flat.php?id=480&group=comp.protocols.kerberos#480

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: ghud...@mit.edu (Greg Hudson)
Newsgroups: comp.protocols.kerberos
Subject: Re: Using PKINIT with ECC
Date: Fri, 23 Feb 2024 18:22:56 -0500
Organization: TNet Consulting
Lines: 7
Message-ID: <mailman.29.1708730585.2322.kerberos@mit.edu>
References: <81773b85-0be5-4412-9d64-ca94b2cdd2b7@sec4mail.de>
<x7dh6hy6a0f.fsf@mit.edu>
Mime-Version: 1.0
Content-Type: text/plain
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="4282"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: kerberos@mit.edu
To: Goetz Golla <mit@sec4mail.de>
DKIM-Filter: OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results: mailman.mit.edu;
dkim=pass (1024-bit key, unprotected) header.d=mit.edu header.i=@mit.edu
header.a=rsa-sha256 header.s=selector2 header.b=RKR7gcS6;
dkim=pass (2048-bit key,
unprotected) header.d=mit.edu header.i=@mit.edu header.a=rsa-sha256
header.s=outgoing header.b=kfFatTVT
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=ht8Ms/FfXYJVqD1d+qlGBqLniDjfdkzHULXpTJECJ2Zx6QhYNo95Z97unFhdrT9Xt1GVMBu9J4YYpQHs/eMW5QVYvvwsSiAjRMXKKm8k9rD1pqcOItrPqfWOj29UrbWWRFZ41uhXFEQpXxoQTj1hy9/+2RF/YKb3oDLhBDQj7IWFM8Yca2W6uNUzts/7HGDoiF5l4VIImJfL7UqjfscM0MZ+A9AWnrA0nBjp5zYfhxpcGT21HPPVigI5Y/iT2LfR+kHnfCdtnSmxPIN6WL/fc3Y8jE5SiQ2mxwn6FVFdiSZlVHTboW1XntOs7HyF8w7aC6St3XKgCtKuM+xhxrVS2g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=5i9Tatt2eWx49nzs6tPpn7nqjv2sfwJ8wN2gVzd/3gk=;
b=IFoTcp7Zzw1QoWak4v4+1stPVdxz3aVZ4chnEdKj2hWzMXG9KbpyDRByK4m6Q5Uk4TUZmXl51HaTi+MUTSN/GBORZBFflCyBXLQOEZCJzjd4wsNTPzn+WYj+ZI623wdnqpxlsGiNlN0cistrKDUPuxWvDOBcao2Rwzk7yprX5VJFS/Pk3HGMzhSqxpOSn/Gq51n6HGLqObVYlwyCY+9P3hatxyDeLHNWR4VrtA/71c0X2NAWgFFBUvKmpfmhuJ0GKMmniiRYY0oGBTx7oPerf6SWxnAgH5Ti6YK88H6Xce2aGdT/tFqAIGlhWnBjEtBUWlKiw/ItyIam7BkWgGmR/A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
18.9.28.11) smtp.rcpttodomain=mit.edu smtp.mailfrom=mit.edu; dmarc=pass
(p=none sp=none pct=100) action=none header.from=mit.edu; dkim=pass
(signature was verified) header.d=mit.edu; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector2;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=5i9Tatt2eWx49nzs6tPpn7nqjv2sfwJ8wN2gVzd/3gk=;
b=RKR7gcS6G+b2wgL1qJ8WZGr2rLRPYrGM2Ed3xmoQXXnlPM/Iu+t32xU/bKnMRawjHe7VWUSvPK/puS0A8UYr0TOFjEHfOY9vDZm+kWzl8iDEL/AixFDgoSjVylqmw0SCIU43JAuNffZZPRnVxXYTqXTgsRP3GGrNQhbg7TmimqM=
Authentication-Results: spf=pass (sender IP is 18.9.28.11)
smtp.mailfrom=mit.edu; dkim=pass (signature was verified)
header.d=mit.edu;dmarc=pass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates
18.9.28.11 as permitted sender) receiver=protection.outlook.com;
client-ip=18.9.28.11; helo=outgoing.mit.edu; pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=outgoing;
t=1708730580; bh=5i9Tatt2eWx49nzs6tPpn7nqjv2sfwJ8wN2gVzd/3gk=;
h=From:Subject:Date:Message-ID:MIME-Version:Content-Type;
b=kfFatTVTM0hYShW2FcNqJDVHlzyn8IUuKG1pnG4Y2U+YHg3lU7UzHDunIKI4TdeRo
OH/x7282MJnJizgDJwoi63d7egOab5evg3Y//YRgSQuo2kIRRA7kYmc0PgogCnIUD2
eSj45Fv2FrpNJlrPEjaWKQeX0KObZnWXEwUtzVvEUe9lVjqSocpbiVVqYlQLn9UOlA
eDdyIUPltfSx+pqXDdLApappX2rbUeTMwN0pV3UoJ8Q5UjNAr+VA9NgaMW7BSjZvYb
SXgxmhT93dOKPsIhZDStQihvgspEL6mOniGlNTvMbJYXRSIFHD+W3ncd5o5Y4eDPyV
adddK4QU/TFGg==
In-Reply-To: <81773b85-0be5-4412-9d64-ca94b2cdd2b7@sec4mail.de>
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: BL02EPF0001A0F9:EE_|PH0PR01MB7409:EE_
X-MS-Office365-Filtering-Correlation-Id: dde1d3c5-4d9b-462f-0555-08dc34c660ce
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:18.9.28.11; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:CAL; SFV:NSPM; H:outgoing.mit.edu; PTR:outgoing-auth-1.mit.edu; CAT:NONE;
SFS:(13230031); DIR:OUT; SFP:1102;
X-ExternalRecipientOutboundConnectors: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Feb 2024 23:23:01.0020 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: dde1d3c5-4d9b-462f-0555-08dc34c660ce
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A0F9.namprd03.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR01MB7409
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <x7dh6hy6a0f.fsf@mit.edu>
 by: Greg Hudson - Fri, 23 Feb 2024 23:22 UTC

> So is there a way to submit a feature request for ECDSA support in MIT
> Kerberos ?

I've filed a PR for this at https://github.com/krb5/krb5/pull/1328 . If
you're in a position to test it, that would be helpful, as the internal
softpkcs11 (which we use for testing) didn't previously have ECDSA
support.

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor